Data Information Security: Friend or Foe?

Data and Information Security:
Friend or Foe?
© 2009 SmartPros® Legal & Ethics, Ltd. All rights reserved.
Data Information Security: Friend or Foe?
MARNI CENTOR: Hello everyone. The Association of Corporate Counsel and SmartPros Legal and Ethics welcome you to
today’s webcast, “Data Information and Security: Friend or Foe?”
[The instructions provided here were intended for attendees of the live webcast when it was originally broadcast. You may
submit questions and comments regarding the content of this course using the Questions and Comments link on the left side
of your screen below the video.]
Our presentation today will be moderated by Julienne Bramesco, general counsel for Colonial Parking. And now, I’ll turn it
over to Julienne.
JULIENNE BRAMESCO: Thank you, Marni, and welcome everyone to ACC’s Small Law Departments Committee
presentation, “Data and Information Security: Friend or Foe?” sponsored, again, by the Small Law Departments Committee
and our sponsor, Meritas. We have a great program today. We have two wonderful speakers: Rob Kleeger, who is the
managing director for The Intelligence Group and Fernando Pinguelo with the law firm of Norris, McLaughlin & Marcus,
P.A.
We’re going to start the presentation with some basic facts, and Rob is going to set the scene for us, but first I’m going to
turn this back over to Marni for the first verification code.
[The CLE code provided here was for use only by attendees of the live webcast. To obtain your CLE certificate for this
archived webcast when you have finished listening to it, click the EXIT COURSE button at the top right of the screen to
return to your My Courses page and then click the certificate link or icon beneath the course listing. In the pop-up window,
select the desired jurisdiction from the drop-down list and enter any requested data, such as your bar number and the CLE
code that popped up while you were playing the archived webcast. (This code is required for New York and Ohio attorneys
only.)]
ROB KLEEGER: Good morning, or afternoon, for those of you who have attended. It is a fact that today’s modern life has
an enormous volume of information which is created, exchanged and stored electronically. Those conventional documents
which originate as computer files, where e-mail is now taking [the] place of both telephone calls and postal letters, and many
if not most commercial business activities are being transacted using computer-based business process. In the past decade,
we’ve seen, read or heard about the breaches of data and data information security. Today it seems almost daily another
organization reports some type of security breach that has occurred. Once seen in only the larger organizations that involved
sophisticated technologies, it is now seen routinely of all size businesses and all various industries.
Data breaches last year were estimated to have cost businesses some $1 trillion, and the Heartland Payments Systems kicked
off 2009 with the disclosure that they’d suffered perhaps the largest data breach in history. And just the other day, Alberto
Gonzales, a hacker previously charged in at least three other federal cases, was indicted by a federal grand jury in New
Jersey yesterday on charges alleging that he and two co-conspirators located in Russia hacked and stole credit card and debit
information of more than 130 million people. So the bar is set pretty high. The indictment alleges that those people affected
had their transactions processed by Heartland Payment Systems, which is one of the largest credit and debit card processing
companies in the world.
So, let’s find out a little bit in terms of data security. And how is data security defined? I’ve asked many people and also did
some searching online, and if you find those surveys, you’ll see that you get many different answers. As these sources will
indicate, you’ll know that data security is simply keeping sensitive information from falling into the wrong person’s hands.
Here is a short list of some business and legal reasons [with] regards to having safeguards in place for data and information
Page 2 of 15
security. Fernando will discuss some of these in a few minutes, typically addressing the top legal issues that businesses are
facing today. From a technical perspective, as well as a business perspective, I’d recommend the general rule that every
business, regardless of size, that maintains computerized records containing personal information must employ reasonable
safeguards to protect it.
Based upon my experiences in many different corporate investigations, there are many different risks, but I simply want to
highlight just a few: workplace, lawsuits, trademark infringement, patent infringement cases, the electronic viruses that exist.
Some additional risks are class action lawsuits, reputational risks, shareholders, media, and oftentimes e-discovery would be
a risk that corporations of all sizes may face.
JULIENNE BRAMESCO: Rob, my company is a low-tech business, pretty much. I mean, we’re a parking company. We
park cars. What kind of intellectual assets would a company like mine have and what kind of intellectual assets do
nontechnical companies have?
ROB KLEEGER: That’s a great question, and I guess it really comes down to: It depends. Many times we’ll be involved
reacting to some type of an investigation. Traditionally you would think that customer lists, software code, any information
in terms of credit card transactions that you, Julienne—that your business may use as a parking garage—could potentially be
a target of some type of attack or breach. It really depends on the nature of how much of this business you maintain these
records and then really how your business is set up. Believe me, we’re in a business that routinely is reacting to the very
simple things that you would imagine a customer list should be protected and have certain controls in place, but quite frankly
aren’t, and we’re brought in after the fact when an employee is now at a competitor and we find that they’ve taken some of
those clients over, even though these are things that are normal and routine in many businesses. It really varies according to
the size, the business, what that business does, how they operate, etc.
JULIENNE BRAMESCO: But it’s really not overstating the case to say that really every business is going to have some
types of intellectual assets that need protection.
ROB KLEEGER: Absolutely, and the exercise is to pay close attention to those things and go through that exercise of: What
are those intellectual assets that you may think might not be important or valuable, which we’re going to cover in a few
slides ahead—how to think about those types of things, and adding some value that either the corporation may decide is not
of value if it ends up in the wrong hands, whereas you might identify that there is information that your business collects,
and if it was to end up in the wrong hands, what the risks and the concerns that can occur [would] be. It’s really just a matter
of taking a step back type of na approach. Oftentimes the investigations that we’re involved with, we result in proving that
those intellectual properties that are not often protected or properly secured should have been in the first place. Many times
it’s simply the individuals—the people that we employ, the human beings—that are the cause of many of the biggest risks.
So, why are these intellectual assets difficult to secure? Some of it is because this information literally could be anywhere.
We’re dealing with, typically, paper records and documents—electronically stored information or ESI. It could be found on
servers, PCs, laptops, smart phones, flash drives, home PCs of your employees, but many times it’s simply in the heads of
those employees. Many times some of these phrases you may recall hearing or may have even stated some of these things
yourself:
“Nobody would ever take that, and if they did, so what?”
“Our employees absolutely do not steal.”
“The competitors—they can’t steal because we have firewalls. Besides, only hackers and other hooligans are going to try to
break in.”
The reality is: These are the types of things that are happening and unfortunately happen more often, and it’s after the fact,
when somebody assumed that no one would have any value to that type of information, you learn that that is, in fact, the
Page 3 of 15
information that has been breached.
Getting to some facts, there’s a survey that's going into its 13th year that’s put out by the Computer Security Institute. In
2008, their survey of over 522 computer security practitioners from various private and public sector corporations,
governmental agencies, financial institutions, medical institutions [and] universities have revealed that more than half of
those organizations that employ less than 1500 [people] are the ones that are causing the biggest threat. You’ll also note, on
the right hand side, the percentages of that demographic of the survey as well. What also is interesting of this survey is that
32% of the respondents were senior executives with the title of “chief” something. This is a pretty big indication that there
are definitely controls in place, regardless of the size of the organization, that security is an issue.
Some of the findings that have been probed were that the most expensive computer security incidents were those that
involved financial fraud, where the average reported cost was close to $500,000. The second most expensive, on average,
was dealing with a bot computer or viruses. A bot is basically a computerized task or program that will automate doing
things such as sending spam to blast Web sites off of the Internet. It could do denial of service (or DOS) attacks. It basically
could take over your computer without your knowledge and use that computer for conducting some type of unlawful
activity. Again, viruses, incurred frequently, and as a point of interest, dealing with loss of either proprietary information or
the loss of customer and employee confidential data averaged at approximately $241,000 and $268,000 respectively.
This is kind of the big shift where we’re starting to see computer crime become a lot more organized and professional. What
that really means is that, in the past, one of the things that the perpetrators were doing were motivated by bragging rights.
Today it’s no longer by bragging rights; it’s about money.
Oftentimes we’re speaking to corporations of all sizes, and sitting around a table where their general counsel, their HR
[human resources] directors, their IT [information technology] directors, the business executives, the CFO [chief financial
officer], the CEO, etc., and you’ll find that in this survey that there were 53% [of] the organizations [that] allotted only 5%
or less of the overall IT budget to information security. [This is] counterintuitive, but what is interesting is that, increasingly,
security is viewed as a problem that is far broader than technology alone, and in many instances it’s part of the security
budget, where it comes from the audit as well as the legal departments.
FERNANDO PINGUELO: Thank you, Rob. As Rob indicated earlier, there are a variety of federal and state laws, as well as
common-law protections when it comes to securing data. Frankly we can spend an entire seminar on each one of the laws
listed in Rob’s previous slides. What I’ve done, from the legal aspect, is [to] select the top seven issues that are confronting
businesses when it comes to electronic data preservation and obligations related to electronic data.
One of the most common issues that I’m confronted by in inquiries from clients is this theft prevention act. Many states have
enacted an identity theft prevention act similar to California’s act. Basically these statutes require businesses to protect
what’s deemed to be private information from disclosure, and if there is disclosure, then it requires certain notification
obligations. When you’re dealing with identity theft prevention act issues, the threshold question relates to what is the
private information or personal information that must be protected as Rob indicated earlier? The acts generally define
personal information as an individual’s first name or first initial and last name linked with any one of a variety of data
elements, including Social Security number, driver’s license number or state identification card number, or account number
or credit or debit card number in combination with any required security code, access code, or password. So to recap, you
need a person’s name, first name or first initial and last name plus any one of these other factors.
JULIENNE BRAMESCO: So it’s a combination of factors, Fernando?
FERNANDO PINGUELO: Correct. It’s the name plus any one of these other factors—Social Security, driver’s license
number, etc. That’s how it’s defined, so if the information that’s lost or it there is a breach related to the information doesn’t
have this combination, then it wouldn’t be found under this act. There is a caveat to that general proposition. To the extent
that the information I just listed—again, name, Social [Security number], driver’s license, etc.—is separated in a variety of
different databases, if the information can be linked together somehow through the breach, then you do have an obligation to
notify the individuals implicated through some sort of a notification.
Page 4 of 15
Once you’ve concluded that the information that has been affected falls within the statute, then the next thing you need to
determine is whether or not a breach has occurred. The statute defines a breach as “unauthorized access to electronic files
containing personal information, as previously defined, that compromises the security confidentiality or integrity of personal
information when access to the personal information has not been secured by encryption.” In other words, many businesses
will have encryption codes that would prohibit general access to the information, so if you don’t have such an encryption
code, then you could be subject to this notice provision under these acts.
Once you determine that personal information has been implicated and there has been a security breach, then the statute
continues to identify what needs to be done in terms of notifying either your employees or your customers that there has
been a breach.
Let me give you an example of what’s come to my attention recently. One of my clients, during a routine audit, determined
that they could not account for 90 backup tapes. They just didn’t know what happened. There was a time when they moved a
few years back, and that could have been a place where they could have lost them or misplaced them, but they just couldn’t
do it. So I had to take them through the act and determine whether or not they needed to notify their employees, because
there was a potential that the information could have contained this personal information. So I took the employees through a
series of steps to investigate what happened and determine whether or not there was a breach that needed to be reported.
After interviewing employees and conducting an internal investigation, we concluded that it was not necessary. So these are
the kinds of steps you would have to go through if such a situation were to happen to you. Fortunately for the company, we
didn’t have to go through the next step, which was notifying the individuals.
JULIENNE BRAMESCO: How likely does the breach have to be Fernando? Is it: We can’t find something but we’re pretty
sure we have it? Or is it the poor guy whose computer got stolen from his car; we know it’s gone?
FERNANDO PINGUELO: There’s no bright line. If you can show due diligence, if you can show a proper investigation—a
thorough investigation—typically involving interviewing employees, tracing the steps or trying to locate logs of data
collection devices, etc. If you can show the steps that you went through to determine that the information that was lost was
not likely within the purview of the statute, then you’re in pretty good shape. But again, that would require internal
investigations and documenting each step. Sometimes, and in this particular case, we actually suggested and the client did
hire a private investigator to interview some people as well, just to show some objectivity. Because the cost would have been
so much greater to notify the employees, we wanted to make sure that we had a sound judgment on the lost data.
JULIENNE BRAMESCO: That’s pretty scary stuff. I just want to remind everyone that you can ask questions to the
panelists by using the question tool on your control panel.
FERNANDO PINGUELO: Typically, what these laws do—and I’ll go over the other six remaining laws—they protect
information, so clients will want to protect confidential information. That typically includes trade secrets or client lists,
intellectual property, personally identifiable information, health and financial information. Typically, we see these issues
come up in a situation where an employee who has access to this information—either intellectual property or confidential
information—either is looking to switch positions to work for a competitor or sometimes we see a situation where a
company will change the terms of an employee’s employment so significantly that it causes the employee to search for a
new job and perhaps even work for a competitor. So if your company is engaging in any sort of changes like that that affect
employees with access to sensitive information, it’s important to be conscious of the fact that at times employees will begin
to download some of this information, and you want to be sure that you’re monitoring that activity.
JULIENNE BRAMESCO: One thing I’ve learned, particularly as a labor and employment lawyer, but even here as a general
counsel, is that when you’re looking at employee terminations or any kind of employment action, it’s really important to get
your IT people involved and to figure out what to do about security and computer access.
FERNANDO PINGUELO: With that, I’ll turn it back to Rob to continue on the technical aspect of the presentation.
Page 5 of 15
ROB KLEEGER: Great. In terms of talking in line with the data breaches, the additional surveys that are out there—there’s
one from the Phenomenon Institute, or the PI, and the PGP Corporation, again, have been putting out surveys like this for
several years. The average cost for a breach per customer record in 2008 is $202. Now I’ve been monitoring these surveys
for the past six years, and every year it increases. So the average and the annual cost, based upon a data breach study that
tracks a wide range of cost factors that include the expensive outlays for detection, escalation, notification and response,
along with legal as well as investigative and administrative expenses that come from customer defections, lost opportunities,
reputation management, as well as the cost associated with customer support, the setting [up] of hotlines which is also a part
of some of these statutes, as well as credit monitoring subscriptions if a breach was to occur and it was reported. There was
an obligation to set up so that those things don't happen again or at least had a good faith step and a reasonable step for the
employers or those potentially who have been the receivers of such breach to set up those hotlines and monitoring
subscriptions.
What was interesting was the average total of per-incident cost in 2008 was $6.65 million compared to the incident cost of
about $6.3 million in 2007. And it has to deal with the reflection of sensitivity of the data from the customers and that the
third-party organizations accounted for more than 44% of all cases in 2008, where most frequently the cases of data breaches
were due to additional investigative and consulting fees that were caused from insider negligence, which the study shows
was about 88% of all of this year’s cases were based upon insider negligence, which in essence is this information, talking to
Julienne’s point of customer records, by not properly going ahead and having the safeguards in place was where the
neglection occurred, which was the increase in the expenses based upon these breaches.
JULIENNE BRAMESCO: So these are all preventable expenses?
ROB KLEEGER: These are all very preventable expenses, absolutely. Everybody, or most people, I would imagine, at this
point in time are familiar with the TJX breach. In June of this year [2009]—and again these are all very recent occurrences—
the owner of TJ Maxx and Marshall’s, the TJX Co., agreed to pay $9.7 million in a settlement with 41 U.S. states, including
Florida, over a 2007 computer breach that left millions of consumers vulnerable to identity theft. This was a multistate
investigation that was triggered by the largest computer security breach ever reported. So it’s kind of in your face on a daily
basis, and this is something that the bar is now set [to a point] that you would think is pretty high. These are the things that
unfortunately are where when you are working overseas with other conspirators. Who knows when the next one is going to
be? The bottom line is that some of the most sophisticated firms have had a breach, and it doesn’t make a difference whether
you are one of these household names or your firm could potentially be next. It really comes down to simply the way that
you do business and the types of information that you collect, and how you maintain that information could be a critical
target.
This is a slide that I use in many a presentation, and it’s what keeps inside and outside corporate counsel asleep at night, and
reasonably should. It really shows that depending upon how your business functions in relationship to using technology, the
flow of business operations, how you interface with your clients and your employees, both inside the corporate enterprise as
well as outside, it could be a very troubling statistic. My recommendation is: If you don’t have one of these, you absolutely
go ahead and you try to develop one—to do a data map. Know your business flow. Know your operation. Know where this
information may in fact exist.
JULIENNE BRAMESCO: Not only am I up at night, but this is giving me a headache. Can you walk us through it a little bit
Rob?
ROB KLEEGER: Sure.
JULIENNE BRAMESCO: What is it that we’re looking at?
ROB KLEEGER: In essence this is something that is commonly asked. Is this a large organization with multiple locations—
international—or is this a small business? The reality is: It depends. Depending upon how your firm does business—for
example, let’s just say that over here is the corporate headquarters where your IT is. And the way that you do business—
Julienne, for your business, for example, you might have multiple locations, and at each of those multiple locations, you’re
Page 6 of 15
going to have computer equipment. And you’re going to have individuals that are going to process this data, and they’re
going to transfer this information from this location to that location—all over the place—which is really what these little fine
lines are showing, is that around the entire world, the way that you’re transacting business, which many times is automated—
you scan a credit card through to pay for the parking of my car in your garage—is going to touch upon multiple systems.
Who are the people and what are their job functions? Do they have access to all of this information which [as] Fernando
[said], going through, that you need your first name or last name, your Social Security number, your credit card information,
your CVV code, which is that three-digit code on your credit card? Whatever everybody is familiar with, when you’re asked
those questions when you purchase something electronically [with] a credit card, whoever has that information—and let’s
just assume it could be on a laptop that gets stolen. This is the level of detail that you need to know, so that in the event a
potential hack occurs, just because it’s a hack doesn’t necessarily mean it’s a breach. It doesn’t mean that you need to go
through those simple steps that Fernando had to go through to take their client to determine, and that we routinely will take
clients through [in] an investigation, to hope that it’s not a breach. And those are the types of things that you really need to
be prepared. So this map is really something that depends on the size of your organization. You really need to get familiar
with these types of things, not only from a breach standpoint, but from the e-discovery standpoint and just from the
standpoint of just knowing how you need to collaborate with other pieces of your business. It’s not solely IT’s responsibility
any longer to know how your business operates.
JULIENNE BRAMESCO: I think that was the real eye-opener for me as I went to a program on e-discovery. And they said
the federal judges expect that lawyers know something about data and about the computers and the fact that “Well, gee, I’m
just a lawyer and I don’t know anything about this,” is just not acceptable any longer.
FERNANDO PINGUELO: Those are great points, and as outside counsel, every time, whether I’m doing work for a client
on the compliance end or establishing policies or whether I’m handling a full-blown litigation, with every client I need to
engage in a discussion with in-house counsel and their IT director on where servers are located, where PCs are located, and
[where] a variety of hardware are located.
To give you a concrete example, I was involved in a 20-day trial in which we had our IT person on the stand for two days.
Would you believe on the night before the second day of testimony, the IT manager had a nightmare and realized that there
was a backup tape he failed to disclose back in a closet in California? So, as you can imagine, in the middle of trial, with two
days worth of testimony, this was a complete shock, and we had to go through a variety of steps to ensure that the other side
was given access to the tape. We had to fly in the tape. We had to make copies and etc., so it was a costly endeavor because
of this forgetful person.
But the reality is: I’m finding, as I deal with IT people, their worst nightmare is losing data. So what happens? They backup
and backup and backup, and they’ve got tapes in their trunk, they’ve got tapes in closets, etc. So as outside counsel and as
inside counsel, you really need to get a hold on what is out there in terms of inventory and where they are being located, so
that something like this—having a nightmare realizing that there is a backup tape that they forgot to account for in a closet in
the back office—doesn’t happen to you. This is a scary slide just simply because it can certainly be burdensome and timeconsuming to understand the system, but once you get it place in a neatly focused protocol, then it’s much easier to deal with
on a day-to-day basis. With that, I’ll turn it back to Rob on the technical [aspects].
ROB KLEEGER: Right, just for the sake of time and to keep the presentation moving. So, where does this information live?
Again, the data map that you saw just a slide ago is there to represent the laptops, the desktops, the servers, the voice over IP
systems, your smartphone devices, your CDs and DVDs, the thumb drives that exist.
But what about your iPods? Some organizations will absolutely have their iPods that are allowed at their offices, and an iPod
is nothing more than a hard drive that you can download information to—not just songs—and there have been many
situations that I’ve had where the theft was committed using an iPod.
How about copy machines? This is something that—I was on WNBC on a report cast that was talking about ID theft. When
the mortgage industry, before it crashed, before the financial industry started to crash, well, guess what? All of your—let’s
Page 7 of 15
just say it’s your mortgage, paperwork, all that documentation—think about [the fact that] you’re going to have a person’s
first name, last name, their Social Security [number], their address, their last five addresses, the mother’s maiden name.
Everything that you need to fill out on an application is now put onto an electronic device, which these digital copiers, which
have hard drives in them, which are connected to a network that many times [isn’t] as secured as commonly IP might think
that they have been, but they haven’t been. They’re plugged in and sometimes IP doesn’t know about it, because it’s not
their territory. They’re not into the main control of digital copiers. That’s facilities or records management. But they plug it
onto their network and it’s not being monitored. And guess what? That’s where your breach could occur and that’s a target.
You just think about knowing where all of this information is, and that is really kind of the lesson learned is thinking about
all of those types of things.
Let’s just go into some of the basic things that you should start to inventory by identifying all personal information, both
paper and electronic, just know where this information would be. Identify all the contractors and vendors and other service
providers that you maintain. Do they maintain any type of personal information? Sometimes you’re outsourcing a payroll
function or HR function. How are they maintaining their records? Is it in a file room that anybody can have access to, and
it’s your employees? Those are the types of things that you need to take control about.
Evaluate different work alternatives or work arrangements. Today it’s very common for people to have more life balance
that would enable them to work from home or remotely. Those types of things are fine, but just as long as you know that that
person’s job function; are they going to be walking around with a laptop or using a home computer that’s going to maintain
client information that’s personal of nature that could potentially be a breach? The issue is really just a matter of identifying
how your business operates. And more often than not, I find myself reacting to a situation—putting Band-Aids that have
been there all along—to then sit down based upon the pain and costs involved where there were certain very preventative,
easy, basic, fundamental steps that corporations could have taken to avoid or mitigate maybe some of that cost. And that’s
really what I’m recommending, is [that] you take a step back and you really relearn, because just as much as you have a
policy today, it doesn’t mean that people are consistently following it and it doesn’t mean that there aren’t new policies
being created that are out of your control. It’s very important to get a handle as to this type of information.
There are some cost effective security tips. One of the things is: If you don’t have a security plan, get one. If you do have a
security plan, then that’s great. Think about the short term, the long term, and most importantly the ongoing. Look at that
thing every quarter [or] every six months, depending upon the nature of your business. Always take that out and look at it
and see what has changed in your business. As technology increases rapidly, companies adapt to the technology, but they’re
neglecting to put that into their security plan. Define how much is enough? How good is enough? Accept the general rule of
thumb that I call good security equals compliance. However, compliance doesn’t necessarily mean that you’re going to have
good security.
Fernando?
FERNANDO PINGUELO: Yes, briefly, the second hot topic that I’m finding clients dealing with is securing their data on
endpoints. Time and time again, I’m confronted with clients who use their own personal memory sticks instead of using a
company-issued stick, so they’re using these memory sticks with personal information on them, etc. This causes a problem
from a compliance point of view and a legal point of view, because how are you supposed to manage these data storage
devices if they’re being used personally?
Another issue that has come up relates to e-mail capacity. I had a client who has a policy where it significantly limits the email capacity of its employees, so they’re only allowed to send and receive attachments to e-mails in a limited capacity. So
that, on its surface, may sound like a great idea. They’re trying to save some storage space, etc., but practically speaking,
what winds up happening is: Employees, since they can’t send this data over the e-mail, they’ll start saving it on their
individual hard drives with their laptops. So this wasn’t an issue; I guess the company knew this was going on, but they
didn’t think much of it until a key employee left his laptop in a car that had been stolen. There you go; you’re now losing a
variety of data because a particular policy that was in place and sounded reasonable on its surface, but people were
circumventing it because it really didn’t adapt to their daily duties. That’s an example of how endpoints can be breached and
there can be security breaches simply because you have a policy that doesn’t quite fit the day-to-day expectations of an
employee.
Page 8 of 15
JULIENNE BRAMESCO: I don’t do this now, but awhile ago I used to actually e-mail myself documents to my home
computer so I could print them out and work on them at home rather than carry them back and forth, and I realized—it came
to me—what a horrible nightmare that could be both in terms of breach and in terms of finding the documents if there was
ever an e-discovery request. So I don’t do that anymore.
ROB KLEEGER: That’s smart. Oftentimes what IT does, to Fernando’s point, is that they do put some type of measures of
limiting their storage boxes of their e-mail. They’re creating Yahoo! accounts or Web-based e-mail accounts that are not
being monitored, or if it is, it might only be monitored to the point that we’re blocking Yahoo!, but we’re not blocking Gmail
or Google. They need to know that they need to block those specific addresses, so that you can’t send Web-based e-mails,
not just you can’t use the Internet for searching. So again, these are very complex. It could be another seminar for another
day. I think the point is knowing what your data is, knowing the data at risk, which is really what this slide is.
A very simple thing that I’ve done many times before is value what type of [information this] is. If you can add and attribute
some type of value to having that credit card number—if that was to get into the wrong person’s hands, is that credit card
number something that would be a high value, five? And if that exposure level was to be a breach that came through our
organization, if you multiply the two, you’re going to now have a risk level. Based upon having certain levels, you set up a
hierarchy that, if it’s in a range between one to five, then maybe you’re just monitoring those types of data security risks. If
it’s a level between six to 15, not only are you monitoring it, but you’re putting some type of access controls in place. You’re
putting some type of protection or policies based upon the work flows in place. You’re putting a couple of different levels or
layers of security. If it’s a degree of risk of, let’s say, 16 or greater, either replace the methods or put stronger encryption
methods in place, or whatever, depending upon the nature of the data that you’re trying to protect, with all being reasonable
in terms of the solutions that are out there to serve the purpose of your size organization to avoid that risk.
It’s really simply going ahead and valuing each independently, as well as if the individual was to have a breach or a hacker
came into our system, and we have a database of comingled credit card, Social Security, CVV and personal information
together, and they had that, like in a case like a TJ Maxx, think about the repercussions and the costs involved, regardless of
the size of the company. Because basically you’re out of business if you’re a small business and that happens. Do some
simple math and assess the value.
Once you have identified and you’ve valued those risks, this next graph is kind of a four-quadrant grid that basically will
show you what you need to do if the information that somebody was to gain access [to] is a high [value] information and it’s
top-secret information to the company and it was to get into the wrong person’s hand, if there’s no regulatory action or
there’s no compliance reason for maintaining that data, destroy it. Once you’ve gotten paid, again, depending upon your
business and whether or not there’s an overseeing agency, you might not want to have that information any longer.
Depending upon the level of degree, as to whether or not it’s in the wrong person’s hands, is whether you’ll choose to
destroy it, you’ll go ahead and ignore it, you can either monitor it, or just secure it.
As far as in summary, whether an individual works for a multinational powerhouse with branches around the world or at a
home office, a sound information security plan really depends upon applying some basics. Take stock of the information that
you currently have. Look at and understand the threats. Identify some type of value in order to protect those types of risks
and threats. Have a preventative program in place that may either be an incident response plan that will maintain records and
audit trails and logs of card access or surveillance systems or monitoring—not only just the IP side, but the physical security
layers as well. Overt or covert is simply a matter of style, but ignorance is just one of those things that today is not going to
stand up well in front of a judge or in the media.
So I close with this slide, which basically is a cartoon that illustrates today how businesses are commonly run. Think about
what could occur if the information contained on your electronic devices, both at your home as well as the workplace, if an
individual at your organization was to lose it, it was to get stolen, or it was to be breached.
I appreciate your attention and listening, and I will have Fernando take through the next portion of the slides.
Page 9 of 15
FERNANDO PINGUELO: Thank you, Rob.
JULIENNE BRAMESCO: Fernando, I’m fascinated by your next topic, because I think we get weekly questions on the
ACC listservs about social networking sites. They just raise so many issues, so I’m really anxious to hear your thoughts
about that and how they relate to data and sensitivity.
FERNANDO PINGUELO: You and me both. This is probably the hottest topic that I’m getting on a weekly basis. I could
break the social networking sites issues into at least four components: HR issues that arise with social networking sites, lost
productivity issues with employees working and surfing the net instead of working, security breaches, and finally cybersnooping.
Let’s focus on the employee/employer issues—HR issues. I’m finding a lot of use of social networking sites to harass fellow
employees. Sometimes employers will make hiring decisions based on information that they find on a person’s MySpace
account. To give you an example, if you can’t discriminate against a person based on what you can see on a resume, you
certainly can’t discriminate against a person based on information you see on a social networking site. What you find with
social networking sites—you’re being provided information that you wouldn’t normally be privy to. Sometimes you may
have information that a person is pregnant or has a medical condition that you wouldn’t normally see on a resume. You can’t
base your hiring practices based on information that you typically would not be able to use against an employee. So we see a
lot of that.
A lot of times employees will use social networking sites for collective bargaining gatherings and discussions or to complain
about an employer. Again, you can’t take an adverse action against an employee just simply because they’re using a method
that traditionally they hadn’t used before.
The second issue relates to lost productivity and that’s self-explanatory. If an employee is surfing their Facebook account
instead of working, there are going to be issues that are going to affect the bottom line eventually. Security breaches: The
headlines often occur that you will see viruses that are incurred because of improper use of social networking sites. Also,
what we’re finding is: Because social networking sites are a very informal, short way to communicate, employees are
disclosing confidential information to others in the outside world unwittingly, so that’s an issue that we’re running against.
Finally, cyber-snooping. There’s nothing necessarily wrong with cyber-snooping. Cyber-snooping: That is using Internet to
gather information about employees or competitors.
JULIENNE BRAMESCO: Or your teenage daughter.
FERNANDO PINGUELO: [There is] not necessarily anything wrong with that in and of itself, but when you take it to a
degree that affects federal statutes that are out there, then it could really put the company in a difficult position. To give you
an example, recently in New Jersey in federal court, the restaurant chain Houston’s was involved in a case of cyber-snooping
that crossed the line. In that particular case, a manager gained access to an employee’s MySpace account by allegedly
coercing an employee to give the access code, so this was not a readily available MySpace account. You needed an access
code and needed to be invited in order to observe what was going on in that site. Lo and behold, the manager obtained the
access code and then accessed that particular employee’s chat room and they found some nasty stuff about management and
customers, and the employee was fired. The employee filed a claim under the Federal Stored Communication Act and
prevailed in the end.
This is a very tough act in that there are mandatory minimums for damages and attorneys’ fees may be awarded. So in that
particular case, the company crossed the line by coercing—a jury did find that the employer did coerce the employee to turn
over the password to gain to the MySpace account of another employee. That’s certainly the four areas that I’m seeing
implicating businesses.
The lines are often blurred because companies often encourage the use of online social networks to conduct business or to
Page 10 of 15
communicate with employees or customers. You have to be careful. If you’re allowing it on one end, you’ve got to be sure
that it’s properly being used.
The next issue that I’m seeing a lot about relates to preserving electronic data, and I didn’t want to spend much time on
electronic discovery, because this is the slide that talks about it, but I do want to touch on a couple of quick points relating to
obligations to preserve data. We all know that we’re all obligated to preserve data when a lawsuit is filed, but the law also
requires preserving data when you anticipate that a lawsuit will be [filed], so that’s where we’re seeing a lot of activity—
clients giving us calls on whether or not they should be issuing litigation hold notices given a particular issue that has arisen
short of the filing of a complaint. That’s a highly fact-sensitive analysis and we really need to know a lot about the situation
in order to recommend whether or not a litigation hold should be affected. Litigation holds can be costly, so we’re very
careful not to impose undue burden on the client in that respect.
Metadata issues are increasingly affecting clients. For those of you who aren’t familiar with metadata, metadata is data about
data. Essentially, when you create an electronic document, whether it be a word document, Excel spreadsheet, etc., there’s a
variety of information contained within that document that may not be visible, at least superficially, that can give a whole
host of information to a variety of people. Typically, metadata is not compelled or not required to be disclosed in a lawsuit
unless specifically asked [for] or there’s a reason for it. But what’s happening is: Parties, in order to drive up the cost of
litigation to encourage settlement, are asking for this type of information routinely.
JULIENNE BRAMESCO: I actually loose leaf over metadata because I think, for many of us who are in-house counsel,
anytime your clients are sending documents to you, you’re affecting the metadata. Isn’t that right?
FERNANDO PINGUELO: Correct, it alters the information. Correct. To give you some examples, where metadata really
comes into play, we see a lot of it when you’re negotiating contracts. Let’s say there are a variety of versions of drafts that
have gone back and forth, and if there’s an issue with a particular term in that contract, parties will turn to metadata to help
support their claims.
Another issue—it comes up with settlement issues. I’m involved in a case right now where we settled the case. We sent
around the settlement agreement and the other side materially altered the settlement, causing the settlement to fall through,
so we filed a motion to compel settlement, and now we’re relying on these various versions of the document to support our
motion. So metadata is increasingly becoming part of cases.
ROB KLEEGER: I would just say, for the years that I’ve been doing what I’ve been doing, it’s in every case in one way,
shape or form.
FERNANDO PINGUELO: This slide illustrates it well. Typically, in the old days, you’d get a paper document. That’s what
you see; an e-mail. But if you look at the metadata associated with the e-mail, you get to know [who] the author is, when it
was created, when it was last saved, last printed, etc. This becomes important information if it becomes an issue whether or
not a document needs to be authenticated or if the issue is when the document was created. Again, this is just a list—a
variety of information—that is contained in metadata.
E-mail metadata is very important too. E-mail metadata is a little bit different than Word document or Excel spreadsheet
data, but it does, again, give you information about the particular e-mail. Of particular interest [is] routing information on
where an e-mail went before it wound up in the person’s inbox. That sometimes gets implicated in cases.
The next hot topic is data protection and privacy. We talked a little bit about that earlier, so I don’t want to re-emphasize
that, but the point being that a variety of states—and I know you attendees are from all over the country—have certain data
preservation protocols besides the federal rules and local rules related to e-discovery that may require notification of either
employees or customers.
JULIENNE BRAMESCO: Fernando, we’ve got a very good question from the audience. What if a business receives
Page 11 of 15
discovery requests or a subpoena for records that contain sensitive information? What does the employer do? What does a
company do to protect that information?
FERNANDO PINGUELO: There’s a variety of things that can be done and I’ll show you an example that I’m involved in
right now. The Department of Justice is conducting a massive investigation against a pharmaceutical company alleging
health care fraud. Our client was just a simple vendor to this big company, so they were subpoenaed and brought into this
criminal investigation simply because they did some work for them. We had a lot of issues related to lists and doctor
information, etc., that we could not disclose. We worked very closely with the U.S. Attorney’s Office to alert them to our
concern, and through a combination of redacting and letting the source entity know what we were doing, we were able to
produce the documents.
In that particular case, there’s very little you can do when the government’s involved and it involves criminal investigations,
but what little you can do can go a long way in terms of protecting the information. The key is open discussions about the
issue and addressing it right away.
Another hot topic, and the last hot topic, is the employee privacy rights. This gets into the issue of monitoring employee emails, etc. There was a case in New Jersey whereby an employee was communicating with her lawyer while employed,
basically planning out a lawsuit of discrimination against the employer. What happened is: When the employee left
employment, the company took her PC, had it imaged, and found these e-mails with her lawyer plotting about the lawsuit
that she was going to file against the company. At the trial court level, the court held that that information, since she was on
the company’s system, on company time, was aware that the employer policy was in place, the court held that she waived
her attorney-client privilege. The company was allowed to keep the e-mails that she had written to her attorney. That case
was subsequently reversed on appeal, but the key lesson to be learned here—what saved the company—was having an
amazing e-mail protocol that addressed the common issues related to the employee use of e-mail, but certainly made it clear
that employees were not to use it inappropriately and it was monitored. The only thing that’s worse than not having a policy
at all is having a policy that is not adhered to. Fortunately for this company, they both had a policy and adhered to it very
well, and that’s what saved them.
JULIENNE BRAMESCO: I just want to point out that if you are a unionized employer, then you may have an obligation to
bargain with your union over certain types of policies and surveillance.
FERNANDO PINGUELO: Correct. Finally just some pointers as I close my part of the presentation. You want to have
policies in place that address privacy issues, employee issues, and e-data issues, and it’s certainly something that we sit
down, as outside counsel, with clients and experts like Rob and his firm to sort of map out what makes sense for the
company. Because if you implement something that makes sense on paper and it doesn’t really make sense when it’s
actually implemented, again, it’s actually worse than not having a policy at all.
Cyber insurance protection: This is something Julienne had mentioned earlier and I thought it was a great topic to add here.
Clients are asking, “How do I protect our business from data breaches?” So, there is what’s called cyber insurance
protection, where you can purchase insurance to protect against massive data breaches. There are a variety of products out
there and it really depends on a variety of conditions and factors that need to be evaluated to determine premiums, but we’re
finding these types of insurance products out there and more and more readily available. The only problem is that they’re
very costly.
JULIENNE BRAMESCO: It’s hard to underwrite when you don’t know—it hasn’t been done that much.
FERNANDO PINGUELO: Exactly, and I listed Marsh and Chubb as two examples. You can feel free to check out their
Web sites for the types of policies they can offer. I thought it would be good to mention that.
JULIENNE BRAMESCO: I recently became aware of this new insurance product. And actually, if you get a hold of an
application for the cyber insurance, actually going through the application itself is a really good tool for figuring out where
Page 12 of 15
your liabilities are.
FERNANDO PINGUELO: That’s a great point. That’s what happens when you’re securing this information. You go
through a variety of checkpoints. They make sure you’re in compliance. They make sure you have, as this slide indicates, a
plan, and you stick to it. They actually force you to do what you should be doing on your own.
With that, Rob and I compiled a list of resources available to you. We tried to focus on government-sponsored resources to
provide you with additional information related to e-data security in a variety of contexts that are listed here. This is some
more information as well.
JULIENNE BRAMESCO: Just because I insisted that our members like to be able to look things up, so thanks for that.
Thank you very much for a really interesting presentation. I do have a couple of questions. Before I get to those, I’d like to
turn this back to Marni to give us the second verification code.
[The CLE code and instructions provided here were for use only by attendees of the live webcast. To obtain your CLE
certificate for this archived webcast when you have finished listening to it, click the EXIT COURSE button at the top right of
the screen to return to your My Courses page and then click the certificate link or icon beneath the course listing. In the popup window, select the desired jurisdiction from the drop-down list and enter any requested data, such as your bar number
and the CLE code that popped up while you were playing the archived webcast. (This code is required for New York and
Ohio attorneys only.)]
JULIENNE BRAMESCO: Thank you, Marni. OK, [we have] a couple of questions from the audience. There was a question
about developing the work flow. This goes back to what I think is slide number 20, getting started with the basics. One of the
points was to identify and/or develop a work flow to track how personal information is received and used. Do you have any
advice on the best way to do that?
ROB KLEEGER: As far as from when I am approached in a situation, a lot of it is simply asking a tremendous amount of
questions. What type of systems do they have? Do they have an exchange server, for one? This is talking to people that are
involved, whether it’s—you want to call it an audit on a proactive side. It’s getting an idea as to what protocols and process
are in place. How do people communicate with clients? How do people communicate with vendors? Is there any procedures
that [are] in place? Are there any forms, that when you’re setting up an outside party and they submit a W-9, if they’re
getting set up as a vendor or a new client in your system, what type of information do you capture? Once that information is
captured, is it captured and stored locally on my hard drive or is it captured on a server somewhere? Is that server backed
up? If so, where is it backed up and how often is it backed up? How often is it maintained?
I don’t have a list that I would be able to necessarily send to anybody. It’s really just going in and stepping away from what
either your role is or, more importantly, pretend you know nothing about the business and get an idea in terms of how you do
this. Once you do that, then what do you do, and where does it go from there? Those are the types of things that you can start
to map out. OK, here’s how this business operates or at least this is what I’ve gathered from speaking to multiple people. But
you might find that not everybody’s doing the same thing, which is a good problem in some respects to know, so that you
can then put in a better procedure, and then train why they want to do it that way and the risks. And in some instances, you
only want to provide information to certain people on a need-to-know basis. Not everybody needs to be e-mailed, “Here’s a
new client and here’s their credit card authorization form.” And believe me, I’ve seen all of that. And that’s the problem,
because if that one laptop that happens to be not protected by a very sophisticated password, and now all of a sudden
anybody can go in there, look at those e-mails, and sure enough, they can look at all their attachments and see this whole
entire file of credit card information at a single form.
JULIENNE BRAMESCO: Wow. I always felt sorry for that poor VA employee who took the work home and had his
computer stolen and he was completely vilified in the press. I thought, “This poor guy’s just trying to catch up on his work.”
So these things—it’s real. It can really happen to anyone.
Page 13 of 15
Do either of you have any thoughts about companies allowing people to use their own cell phones or iPhones for personal
use? Are there pitfalls and dangers to this? I have an idea that we could probably spend an hour just on this topic. Any
thoughts, though?
FERNANDO PINGUELO: I can pick up on that real briefly. We see it all the time because either the cell phone’s issued by
the company, or what happens more often than not, employees get their own cell phone and they’re given a monthly stipend
to cover the costs. The only thing I can say in either scenario is that just make sure you know the hardware, who’s using
what and when, and if it’s company-issued, you’d better be sure that you have the inventory of all of the devices that are
being used by your employees.
ROB KLEEGER: I actually had a conversation with a client yesterday about that very same topic. Again, to Fernando’s
point earlier, and it’s been mentioned throughout, if you don’t have a policy, or you do have a policy, you’d better enforce it.
The reality is, just like Julienne was sending e-mails from her work to her home computer, which is something that
everybody does, and everybody is a good person, is that problem that occurs when your laptop gets stolen and now you’re
the victim. That’s the problem.
A cell phone is the same thing. Many times, organizations will be able to control their e-mails. Maybe they’ll provide
BlackBerrys that they’ll give the employees; certain devices that are standard devices that the business can support. They can
track that asset. They know what type of information can be controlled on that, so those e-mails that could very well be
going through that BlackBerry server; they’re in control of that. There’s also technology out there and some things are pretty
incredible. You actually have documents that can expire. You have information that you need certain keys and codes in order
to view. In some instances, you can use those types of things, as well as, as technology continues to advance, and it’s
advancing at a far more superior rate than anybody’s able to keep up with, but through the use of this type of technology,
there’s monitoring for cell phone devices. It’ll always continue to get better and advance as we go along. Again, keep in
mind how people communicate. By giving them 24/7 access, which is now an expectation that people have, that nobody is
not available for 24 hours any longer. You’re available because [clipped] to your hip happens to be a device.
JULIENNE BRAMESCO: Again, we could spend hours talking about the implications of the 24/7 workplace. Thank you so
much, both of you. In just a moment I’m going to ask you if there are places where people can go about information about
your firms or about these topics generally, but before I do, I just want to thank the sponsor, Meritas, again and to thank the
audience for being here and for participating today, and also to remind everyone that ACC has a fantastic annual meeting
scheduled for October 18 through 21st [2009] in Boston. There is still room available and hope to have as many of my inhouse counsel colleagues as possible at the meeting.
I’m going to turn it back over to Rob and Fernando for the last word on how we can get more information.
FERNANDO PINGUELO: Rob and I have a variety of sources available to you and you can sign up for our newsletters. I
run an educational e-data blog called E-Lessons Learned, and you can get newsletters [on a] sometimes weekly, if not
monthly, basis on e-discovery and e-data best practices. Basically what we do is we pick apart cases, real-life examples, and
identify what went wrong and what could have been done better in order to better educate businesses out there. We’ve set up
the blog so that it is employee-specific, so we have low-level employees, we have management employees, we have in-house
counsel employees, etc. So you could literally pick a category of employee and see examples of where employees did things
that were inappropriate or negligent, and how it resulted in an adverse ruling on an employer, and how to learn from it. Also
Rob does a monthly newsletter he can talk a little bit about.
ROB KLEEGER: The next slide will show our contact information, but I have an opt-out newsletter that I’ve been doing for
several years which always gets a great amount of attention and feedback, where it really highlights a lot of the issues that
are happening, not only electronic discovery, but just in the electronic world in and of itself. It’s really done in a format
that’s like a postcard. It gives enough information that if you’re interested, it gives you the sites to go and review that type of
information that’s of interest to you. There’s some other helpful tips and whatnot, but you can send me an e-mail if you’re
interested and I can get you onto that monthly newsletter.
Page 14 of 15
If you flip to the next slide, it’ll have both our contact details for both myself and Fernando. Thanks very much for
everybody’s participation. Are there any other questions?
JULIENNE BRAMESCO: Marni?
MARNI CENTOR: It does not look like we have any more questions, so on behalf of the Association of Corporate Counsel
and SmartPros Legal and Ethics, thank you again for listening to today’s program.
[The instructions provided here for obtaining CLE credit were for use only by attendees of the live webcast. To obtain your
CLE certificate for this archived webcast, please see the instructions above.]
Thank you again and have a good day.
© 2009 SmartPros® Legal & Ethics, Ltd. All rights reserved.
Page 15 of 15